Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2014-3917


kernel/auditsc.c in the Linux kernel through 3.14.5, when CONFIG_AUDITSYSCALL is enabled with certain syscall rules, allows local users to obtain potentially sensitive single-bit values from kernel memory or cause a denial of service (OOPS) via a large value of a syscall number.


Published

2014-06-05T17:55:07.307

Last Modified

2025-04-12T10:46:40.837

Status

Deferred

Source

[email protected]

Severity

CVSSv2: 3.3 (LOW)

CVSSv2 Vector

AV:L/AC:M/Au:N/C:P/I:N/A:P

  • Access Vector: LOCAL
  • Access Complexity: MEDIUM
  • Authentication: NONE
  • Confidentiality Impact: PARTIAL
  • Integrity Impact: NONE
  • Availability Impact: PARTIAL
Exploitability Score

3.4

Impact Score

4.9

Weaknesses
  • Type: Primary
    CWE-200

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Operating System suse linux_enterprise_desktop 10.0 Yes
Operating System redhat enterprise_linux 5 Yes
Operating System redhat enterprise_linux 6.0 Yes
Operating System redhat enterprise_mrg 2.0 Yes
Operating System linux linux_kernel ≤ 3.14.5 Yes
Operating System linux linux_kernel 3.14 Yes
Operating System linux linux_kernel 3.14 Yes
Operating System linux linux_kernel 3.14 Yes
Operating System linux linux_kernel 3.14 Yes
Operating System linux linux_kernel 3.14 Yes
Operating System linux linux_kernel 3.14 Yes
Operating System linux linux_kernel 3.14 Yes
Operating System linux linux_kernel 3.14 Yes
Operating System linux linux_kernel 3.14 Yes
Operating System linux linux_kernel 3.14.1 Yes
Operating System linux linux_kernel 3.14.2 Yes
Operating System linux linux_kernel 3.14.3 Yes
Operating System linux linux_kernel 3.14.4 Yes

References